commit ee6a569d3bf64c9676eee3eecb861fb01cc11311
Author: Michael Mueller <email address hidden>
AuthorDate: Wed Feb 9 16:22:17 2022 +0100
Commit: Christian Borntraeger <email address hidden>
CommitDate: Fri Feb 25 14:30:13 2022 +0100
KVM: s390: pv: make use of ultravisor AIV support
This patch enables the ultravisor adapter interruption vitualization
support indicated by UV feature BIT_UV_FEAT_AIV. This allows ISC
interruption injection directly into the GISA IPM for PV kvm guests.
Hardware that does not support this feature will continue to use the
UV interruption interception method to deliver ISC interruptions to
PV kvm guests. For this purpose, the ECA_AIV bit for all guest cpus
will be cleared and the GISA will be disabled during PV CPU setup.
In addition a check in __inject_io() has been removed. That reduces the
required instructions for interruption handling for PV and traditional
kvm guests.
Signed-off-by: Michael Mueller <email address hidden>
Reviewed-by: Janosch Frank <email address hidden>
Link: https://<email address hidden>
Reviewed-by: Christian Borntraeger <email address hidden>
Signed-off-by: Christian Borntraeger <email address hidden>
------- Comment From <email address hidden> 2022-03-09 04:33 EDT-------
This is part of linux next (for 5.18)
https:/ /git.kernel. org/pub/ scm/linux/ kernel/ git/kvms390/ linux.git/ commit/ ?h=next& id=ee6a569d3bf6 4c9676eee3eecb8 61fb01cc11311
commit ee6a569d3bf64c9 676eee3eecb861f b01cc11311
Author: Michael Mueller <email address hidden>
AuthorDate: Wed Feb 9 16:22:17 2022 +0100
Commit: Christian Borntraeger <email address hidden>
CommitDate: Fri Feb 25 14:30:13 2022 +0100
KVM: s390: pv: make use of ultravisor AIV support
This patch enables the ultravisor adapter interruption vitualization
support indicated by UV feature BIT_UV_FEAT_AIV. This allows ISC
interruption injection directly into the GISA IPM for PV kvm guests.
Hardware that does not support this feature will continue to use the
UV interruption interception method to deliver ISC interruptions to
PV kvm guests. For this purpose, the ECA_AIV bit for all guest cpus
will be cleared and the GISA will be disabled during PV CPU setup.
In addition a check in __inject_io() has been removed. That reduces the
required instructions for interruption handling for PV and traditional
kvm guests.
Signed-off-by: Michael Mueller <email address hidden>
Reviewed-by: Janosch Frank <email address hidden>
Link: https://<email address hidden>
Reviewed-by: Christian Borntraeger <email address hidden>
Signed-off-by: Christian Borntraeger <email address hidden>